False Lenovo Security Report Only Strengthens World's Top PC Maker
A report that Western nations deemed Lenovo PCs to be insecure was quickly kiboshed this week. CIO.com columnist Rob Enderle smells a rat and suspects it's only a matter of time before the source is...
View ArticleGoogle's Invasions of Privacy, Free But Flawed Products Show Its Arrogance
Google is now admitting that its users shouldn't expect privacy when using Gmail. Meanwhile, a PC OEM says the free Android OS costs more, and causes more headaches, than Windows. Put this together,...
View ArticleMcAfee Moves to Redefine SIEM, Enterprise Security
Most security information event management systems can identify threats, but they can't remove them. All this does is put a bull's eye on a CIO's back. McAfee's new Enterprise Security Manager takes...
View ArticleMcAfee security report suggests 2014 will be a rough year
Smartphones, social networks, PCs, servers, cloud services, governments and national infrastructure all face security risks in 2014, according to the latest McAfee security report. On, and virtual...
View ArticleMcAfee Offers Global Response to Nationalized Malware
In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches...
View ArticleEverything you know about enterprise security is wrong
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide...
View ArticleLessons learned from the Apple-Google privacy fight
One of the fascinating things about the last decade was the iPhone. We had a market dominated by companies like Palm, RIM, Nokia and Samsung. Each was incredibly powerful in its segment and two were...
View ArticleU.S. surveillance programs are killing the tech industry
The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has...
View ArticleHow to stop the security breach tsunami
It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge...
View ArticleSecurity threats and why you never want to name anything
There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to...
View ArticleBelgium attacks reinforce that security is everybody’s problem
In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the...
View ArticleNew IoT security certification aims to make the world safer
Underwriters Laboratories new Cybersecurity Assurance Program (CAP) looks to certify Internet of Things products. Columnist Rob Enderle writes that these CAP certification will improve IoT security and...
View ArticleWhy the NSA should be considered a hostile agency
When an agency with security in its name chooses to exploit a security exposure rather than fix it, we have a problem, writes columnist Rob Enderle.
View ArticleWhy assuming data is secure is dangerous and stupid
The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure.
View ArticleHow San Diego’s CISO battles cyberthreats
An overwhelming amount of ransomware and phishing attacks plague private and public companies. Columnist Rob Enderle writes how one CISO is successfully defending against the current threat landscape.
View Article
More Pages to Explore .....